CAMELLIA-192-CFB ENCRYPTION TOOL

Other Crypto Algorithms

AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAP 

Introduction

The Camellia-192-CFB algorithm is a symmetric key block cipher that operates with a 192-bit key and a 128-bit block size using the Cipher Feedback (CFB) mode of operation. It is designed for high security and efficiency in both software and hardware implementations. Camellia belongs to the family of modern block ciphers standardized by ISO/IEC and NESSIE, providing comparable security to AES while maintaining distinct structural properties.

Key Characteristics

  • Block Size: 128 bits
  • Key Size: 192 bits
  • Mode of Operation: Cipher Feedback (CFB)
  • Type: Symmetric, iterative Feistel network
  • Rounds: 24 rounds for 192-bit keys

Algorithm Structure

Camellia uses a generalized Feistel network with a series of substitutions and linear transformations. The encryption process involves the following stages:

  1. Key Schedule: The 192-bit key is expanded into multiple round keys using a predefined schedule. This process involves rotations, XOR operations, and S-box applications to produce keys for each round.
  2. Initial Whitening: The plaintext block is combined with the first set of round keys using XOR to increase diffusion before entering the round structure.
  3. Round Function: Each round includes the application of substitution boxes (S-boxes) followed by linear transformations and modular addition. For 192-bit keys, Camellia performs 24 rounds divided into 6 groups with FL/FL-1 functions applied at specified intervals.
  4. CFB Mode Processing: In Cipher Feedback mode, the previous ciphertext block or an initialization vector is encrypted using Camellia, and the resulting output is XORed with the current plaintext block to generate the ciphertext. This mode allows Camellia to operate as a stream cipher for variable-length data while maintaining strong cryptographic properties.
  5. Final Whitening: After completing all rounds, the resulting block is combined with the last set of round keys through XOR to produce the final ciphertext.

Security Features

  • Resistance to differential and linear cryptanalysis due to the complex Feistel structure and multiple substitution layers.
  • Key size of 192 bits provides a high level of brute-force resistance.
  • CFB mode ensures confidentiality for arbitrary-length data without padding requirements.
  • Designed to operate efficiently in both hardware and software environments while maintaining consistent security properties.

Applications

Camellia-192-CFB is widely suitable for secure communication systems, data encryption for storage, network protocols, and applications where a combination of block cipher security and stream cipher flexibility is required.